Enable job alerts via email!

L3 SOC Analyst

MINDTEL GLOBAL PRIVATE LIMITED

Dubai

On-site

AED 150,000 - 200,000

Full time

30+ days ago

Job summary

A leading company in cybersecurity is seeking a skilled SOC Analyst Level 3 for its Cybersecurity Operations Center in Dubai. This senior role requires expertise in threat detection, incident response, and mentoring junior analysts. The position involves hands-on work with SIEM tools, advanced log analysis, and leading threat hunting activities, making it ideal for candidates with substantial experience and relevant cybersecurity certifications.

Qualifications

  • Minimum 5 years of experience in cybersecurity.
  • At least 2 years as a Level 3 SOC Analyst.
  • Strong hands-on experience with SIEM tools.

Responsibilities

  • Lead incident response for critical cybersecurity threats.
  • Monitor and analyze security events using SIEM tools.
  • Mentor and guide L1 / L2 SOC analysts.

Skills

Incident response
Malware analysis
Threat intelligence
Network traffic analysis
Scripting (Python, PowerShell, Bash)

Education

Cybersecurity certifications (CEH, CHFI, etc.)

Tools

SIEM (Splunk, QRadar, ArcSight)
EDR (CrowdStrike, SentinelOne)
Forensic tools (EnCase, FTK)
Firewalls

Job description

We are seeking a skilled and experienced SOC Analyst Level 3 to join our Cybersecurity Operations Center.

This is a senior-level role that requires hands-on expertise in threat detection, incident response, threat hunting, and advanced log analysis.

The ideal candidate will serve as a technical lead in investigating complex security incidents, mentoring junior analysts, and proactively improving the organization's security posture.

Key Responsibilities:

  1. Act as a lead incident responder for critical cybersecurity threats and advanced persistent threats (APTs).
  2. Monitor and analyze security events using SIEM (e.g., Splunk, QRadar, LogRhythm) and EDR tools (e.g., CrowdStrike, SentinelOne).
  3. Perform in-depth investigation of alerts to determine the severity, scope, and impact of potential security incidents.
  4. Conduct root cause analysis and forensic reviews using tools like EnCase, FTK, or open-source equivalents.
  5. Lead threat hunting activities using threat intelligence feeds, behavioral analytics, and advanced data correlation.
  6. Develop and fine-tune correlation rules, use cases, dashboards, and alerting logic in SIEM platforms.
  7. Collaborate with other cybersecurity and IT teams to coordinate incident containment, eradication, and recovery.
  8. Assist in the development and continuous improvement of playbooks, response procedures, and knowledge bases.
  9. Mentor and guide L1 / L2 SOC analysts, providing training and review of escalated incidents.
  10. Stay updated on the latest cybersecurity threats, vulnerabilities, and regulatory requirements (e.g., ISO 27001, GDPR).

Skills & Experience:

  1. Minimum 5 years of experience in cybersecurity with at least 2 years in a Level 3 SOC Analyst role.
  2. Strong hands-on experience with SIEM tools (e.g., Splunk, QRadar, ArcSight).
  3. Proficient in incident response, malware analysis, threat intelligence, and network traffic analysis.
  4. Experience with EDR / XDR platforms, firewalls, IDS / IPS, DLP, and forensic tools.
  5. Good understanding of MITRE ATT&CK, cyber kill chain, TTPs, and common threat actors.
  6. Scripting skills (Python, PowerShell, Bash) are an advantage.
  7. Knowledge of cloud security (AWS, Azure, GCP) and securing hybrid environments.

Certifications:

  • CEH, CHFI, GCIH, GCIA, GCFA, OSCP, or other relevant cybersecurity certifications.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.